CVE-2023-31418
- EPSS 1.14%
- Veröffentlicht 26.10.2023 18:15:08
- Zuletzt bearbeitet 21.11.2024 08:01:49
An issue has been identified with how Elasticsearch handled incoming requests on the HTTP layer. An unauthenticated user could force an Elasticsearch node to exit with an OutOfMemory error by sending a moderate number of malformed HTTP requests. The ...
CVE-2023-31417
- EPSS 0.05%
- Veröffentlicht 26.10.2023 18:15:08
- Zuletzt bearbeitet 13.02.2025 17:16:27
Elasticsearch generally filters out sensitive information and credentials before logging to the audit log. It was found that this filtering was not applied when requests to Elasticsearch use certain deprecated URIs for APIs. The impact of this flaw i...
CVE-2022-23712
- EPSS 3.23%
- Veröffentlicht 06.06.2022 18:15:09
- Zuletzt bearbeitet 21.11.2024 06:49:09
A Denial of Service flaw was discovered in Elasticsearch. Using this vulnerability, an unauthenticated attacker could forcibly shut down an Elasticsearch node with a specifically formatted network request.
CVE-2022-23708
- EPSS 0.25%
- Veröffentlicht 03.03.2022 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:49:09
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index.
CVE-2021-22147
- EPSS 0.31%
- Veröffentlicht 15.09.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 05:49:35
Elasticsearch before 7.14.0 did not apply document and field level security to searchable snapshots. This could lead to an authenticated user gaining access to information that they are unauthorized to view.
CVE-2021-22144
- EPSS 0.21%
- Veröffentlicht 26.07.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 05:49:35
In Elasticsearch versions before 7.13.3 and 6.8.17 an uncontrolled recursion vulnerability that could lead to a denial of service attack was identified in the Elasticsearch Grok parser. A user with the ability to submit arbitrary queries to Elasticse...
CVE-2021-22146
- EPSS 29.9%
- Veröffentlicht 21.07.2021 15:15:14
- Zuletzt bearbeitet 21.11.2024 05:49:35
All versions of Elastic Cloud Enterprise has the Elasticsearch “anonymous” user enabled by default in deployed clusters. While in the default setting the anonymous user has no permissions and is unable to successfully query any Elasticsearch APIs, an...
CVE-2021-22145
- EPSS 67.93%
- Veröffentlicht 21.07.2021 15:15:14
- Zuletzt bearbeitet 08.07.2025 11:15:23
A memory disclosure vulnerability was identified in Elasticsearch 7.10.0 to 7.13.3 error reporting. A user with the ability to submit arbitrary queries to Elasticsearch could submit a malformed query that would result in an error message returned con...
CVE-2021-22137
- EPSS 0.11%
- Veröffentlicht 13.05.2021 18:15:09
- Zuletzt bearbeitet 21.11.2024 05:49:34
In Elasticsearch versions before 7.11.2 and 6.8.15 a document disclosure flaw was found when Document or Field Level Security is used. Search queries do not properly preserve security permissions when executing certain cross-cluster search queries. T...
CVE-2021-22135
- EPSS 0.15%
- Veröffentlicht 13.05.2021 18:15:08
- Zuletzt bearbeitet 21.11.2024 05:49:34
Elasticsearch versions before 7.11.2 and 6.8.15 contain a document disclosure flaw was found in the Elasticsearch suggester and profile API when Document and Field Level Security are enabled. The suggester and profile API are normally disabled for an...